Argeniss Security Advisory
Name: Vulnerability in Microsoft FrontPage Server Extensions Could Allow
Cross-Site Scripting (MS06-17)
Affected Software: Microsoft FrontPage Server Extensions 2002 and Microsoft
SharePoint Team Services
Remote exploitable: Yes (User intervention required)
Credits: Esteban Mart=EDnez Fay=F3
Advisory Number: ARG040602
The FrontPage Server Extensions 2002 (included in Windows Sever 2003 IIS 6.0
and available as a separate download for Windows 2000 and XP) has a web page
/_vti_bin/_vti_adm/fpadmdll.dll that is used for administrative purposes.
This web page is vulnerable to cross site scripting attacks allowing an
attacker to run client-side script on behalf of an FPSE user. If the victim
is an administrator, the attacker could take complete control of a Front
Page Server Extensions 2002 server.
To exploit the vulnerability an attacker can send a specially crafted e-mail
message to a FPSE user and then persuade the user to click a link in the
In addition, this vulnerability can be exploited if an attacker hosts a
malicious website and persuade the user to visit it.
The vulnerable parameters of fpadmdll.dll are "operation", "command", and
"name". These parameters appears in the output without properly sanitization
in an HTML comment but it can be escaped with a '-->'.
An attacker could create a FORM that POST to the FPSE server and executes a
script on the client system.
Also, an attacker could inject an image from another web site that he has
control over and if it has HTTP authentication could convince the user to
enter its credentials and capture it.
Vendor was contacted and a patch was released.
Apply patch MS06-017.
Argeniss Ultimate 0day Exploits Pack
Argeniss - Information Security
*Application Security Experts*
Espacio para todos tus mensajes, antivirus y antispam =A1gratis!
=A1Abr=ED tu cuenta ya! - http://correo.yahoo.com.ar